Security-Information Flow in the South African Public Sector

Abstract:

Information-security management programs are becoming increasingly important in enabling organisations to promote a high level of accountability and good governance. Organisations need accurate and relevant real-time information to make effective and efficient decisions pertaining to cyber threats and attacks. Based on a qualitative study, this article introduces and discusses the components of an information-security management program. The study found that information-security management and communication of security information in South African government departments are very limited. A conceptual model for security- information flow is proposed as a strategic driver to manage information security in the public sector.


AUTHORS

Photo of Dr. Harold Patrick

School of Management, IT and Governance University of KwaZulu-Natal, 
South Africa

Dr. Harold Patrick is a forensic  investigation specialist at the University of KwaZulu-Natal, South Africa. He completed his doctorate at University of KwaZulu-Natal in 2016. His dissertation focused on information security, collaboration, and the flow of security information. He earned a master’s degree information systems and technology and is a Certified Fraud Examiner.

Photo of Dr. Brett van Niekerk

School of Management, IT and Governance University of KwaZulu-Natal
South Africa

Dr Brett van Niekerk is currently a senior lecturer in computer science at the University of KwaZulu-Natal, and previously was a senior information security analyst at Transnet. He has 10 years’ experience in information security, cybersecurity and information operations spanning academia, industry and civil society. He serves as secretary for the International Federation of Information Processing Working Group 9.10 on ICT in Peace and War, co-Editor-in-Chief of the International Journal of Cyber Warfare and Terrorism, Associate Editor for the International Journal of Information Security and Privacy, on the international advisory board for the Journal of Information Warfare, as a reviewer for multiple other international and local journal and conferences such as the International Conference on Cyber Warfare and Security and the European Conference on Cyber Warfare and Security. He previously served as ISACA South Africa’s Academic Relations Coordinator (2016-2018) and a contributor to the SABS working group for ISO/IEC 27000-series standards. In 2012 he graduated with his PhD and has subsequently completed two years of postdoctoral research into information warfare and critical infrastructure protection. He is an NRF rated researcher, and has made over 30 presentations at local and international conferences and has published ten book chapters and over 20 journal articles. He is a Certified Information Security Manager, achieving the third highest score in South Africa in the December 2014 exam period. In 2018 he was award ISACA South Africa’s contribution award for his work in information security and cybersecurity.

 

Photo of Dr. Ziska Fields

School of Management, IT and Governance University of KwaZulu-Natal, 
South Africa

Dr.  Ziska Fields  is  an associate professor and academic leader at the University of KwaZulu-Natal, South Africa. Her research interests focus on creativity, entrepreneurship, human resources, and higher education. She developed two theoretical models to measure creativity in South Africa, focusing on youth and tertiary education. She  has  published  in internationally recognized journals and edited books. She is the editor of the book Incorporating business models and strategies into social entrepreneurship and has completed another book titled Collective creativity for responsible and sustainable business practice. She is a member of the South African Institute of Management, the Ethics Institute of South Africa, and the Institute of People Management.

 

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com